Whonix - Overview
Whonix is an anonymous operating system that runs like an app and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
What is Whonix? - Your Internet Privacy Super Tool
![]()
![]()
(more videos).
Technical readers can refer to theWhonix technical introduction instead.
Superior Internet Privacy
Whonix is a free and open-source desktopoperatingsystem (OS) that is specifically designed foradvanced security and privacy
. It's based on theTor

anonymity network, security-focused Linux DistributionKicksecure™
, GNU/Linux and the principle of security by isolation. Whonixdefeats common attacks while maintaining usability.
Security hardened
Whonix uses an extensively security reconfigured of the Debian base (Kicksecure™ Hardened) which is run inside multiplevirtualmachines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware andIP leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input.Learn more.
Privacy First Users
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Whonix is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using Whonix.Learn more.

Innovative Architecture
Whonix consists of two VMs: theWhonix-Gateway™ and theWhonix-Workstation™. The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible.Learn more.
Now we're diving deep into what makes Whonix great. We'll provide a more detailed look and lots of links for you to even more thoroughly study Whonix.
Introduction
[edit]



Whonix is a free and open-source desktopoperatingsystem (OS) that is specifically designed foradvanced security and privacy
. It's based on theTor

anonymity network, security-focused Linux DistributionKicksecure™
, GNU/Linux and the principle of security by isolation.
Whonixdefeats common attacks while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover theuser's physical location.[1]
Whonix uses an extensively security reconfigured of the Debian base (Kicksecure™ Hardened). It consists of two virtual machines --Whonix-Gateway andWhonix-Workstation -- which are designed to be used on asupported host OS (Host Operating System Selection). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work (USB Installation). Users choose the preferred Whonix configuration and may use either a Type I hypervisor (Qubes-Whonix™), or a Type II hypervisor likeKVM andVirtualBox.
This architecture provides a substantial layer of protection from malware andIP leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. Whonix is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools Whonix provides also make it ideally suited for hosting secure and anonymous onion services.
By helpingusers run applications anonymously Whonix aims to preserve privacy and anonymity. Aweb browser,office suite, andother relevant applications come pre-configured with security in mind. Internet traffic by Whonix is all routed through the Tor anonymity network.
Whonix isFreedom Software and is based onKicksecure™
(security-focused Linux Distribution), Tor[2], Debian GNU/Linux[3], and the principle of security by isolation.
Whonix User Groups
[edit]
Privacy is a human right. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Whonix is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using Whonix. This includes the following. Also seeUsers of Whonix.
- Investigators and whistleblowers whose work threatens the powerful. Within our isolated environment, research and evidence can be gathered without accidental exposure.
- Researchers, government officials or business-people who may be targets of espionage. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
- Journalists who endanger themselves and their families by reporting on organized crime. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
- Political activists under targeted surveillance and attack. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a Whonix user is greatly increased.
- Average computer users in a repressive or censored environment. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
- Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed. Whonix does not silently upload identifying information in the background.
Whonix Architecture
[edit]
Whonix consists of two VMs: theWhonix-Gateway and theWhonix-Workstation.[4] The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The Whonix architecture affords several benefits:
- Only connections through Tor are permitted.
- Servers can be run, and applications used, anonymously over the Internet.
- DNS leaks are impossible.
- Malware with root privileges cannot discover the user's real IP address.
- Threats posed by misbehaving applications and user error are minimized.
- The platform hasextensive security hardening

.
Features
[edit]Full Spectrum Anti-Tracking Protection
[edit]Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.
| Surveillance Technology | Impact on your Privacy | Whonix Tracking Protection Technology |
|---|---|---|
| IP address tracking | IP is tied to user identity and physical location. | Reliable IP Hiding;IP cloaking using Tor |
| Browser fingerprinting | Tracking, creating a profile of the user even if the user is already cloaking its IP. | Tor Browser |
| Website Traffic Fingerprinting | Yourinternetserviceprovider (ISP) knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN.[5] For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attacker could figure out who you are. | IP cloaking using Tor |
| Personal keyboard typing and mouse fingerprinting | Re-identification once you are typing on a website because of your personal typing style. | kloak (keystroke and mouse anonymizer) |
| Time attacks | Individual computer time can give away your identity. | Boot Clock Randomization and secure network time synchronization throughsdwdate (Secure Distributed Web Date) |
| Other threats. | Techniques likeStylometry (analysis of writing style) and various other tracking technologies can be employed to track users without the need for IP addresses. | Whonix is a technological means to anonymity, but staying safe necessitates complete behavioral change; it is a complex problem without an easy solution. The more you know, the safer you can be. SeeDocumentation. |
Based on Debian
[edit]
In oversimplified terms, Whonix is just a collection of configuration files and scripts. Whonix is not a stripped down version of Debian; anything possible in "vanilla" Debian GNU/Linux can be replicated in Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install VLC Media Player on Whonix?" -- "The same way as in Debianapt install vlc. Whonix does not break anything, limit functionality, or prevent installation of compatible software.
Based on Kicksecure
[edit]
Redirection to Kicksecure Documentation
NOT-SELFCONTAINED: This wiki page is not self-contained by design. This It only includes details specific to Whonix. For full understanding, please follow the link below to the Kicksecure wiki, which provides more complete background and instructions.
- Introduction:Whonix Documentation Introduction, User Expectations, Footnotes and References, User Expectations - What Documentation Is and What It Is Not
- Whonix is based on Kicksecure™: Whonix is built on top of Kicksecure. This means it uses many of the same security tools, design concepts, and configurations.
- Kicksecure is based on Debian: Kicksecure is developed using Debian as its base. Debian is a widely used, stable, and free Linux operating system.
- Inheritance: As a result, Whonix is alsobased on Debian.
- Debian is GNU/Linux-based: Debian is built using the GNU/Linux operating system. GNU provides essential tools and Linux is the system’s kernel (core).
- Shared documentation benefits: Since each system is based on the one below it, a lot of documentation and guides are shared. This reduces the need to duplicate information.
- Inherited documentation: Most instructions and explanations are inherited from Kicksecure or Debian, unless otherwise specified.
- Shared principles: The systems share similar security goals and setup instructions. In most cases, users can follow Kicksecure documentation when using Whonix.
- Keep using Whonix: This doesnot mean users should switch to Kicksecure. This page only points to related, helpful information.
- Where to apply the instructions: Follow the instructions inside Whonix unless specifically stated otherwise.
- Wiki editors notice: This information is pulled from a reusable wiki template:upstream_wiki. (See which pages use this.)
- Comparison:Whonix versus Kicksecure
- Documentation compatibility: Because Whonix is based on Kicksecure, you can often follow Kicksecure’s instructions as long as you apply them in the right place.
- Summary: Whonix is built on top ofKicksecure, which itself is based onDebian. Debian is a GNU/Linux operating system. This layered design means Whonix inherits many features, tools, and documentation from both Kicksecure and Debian.
- Click here: Visit the related page in the Kicksecure wiki for full documentation and background:
- Note: Re-interpretation...
Apply the instructions inside Whonix,not inside Kicksecure.
Kicksecure: Perform these steps inside Kicksecure.
Instead, apply the steps inside Whonix-Workstation.
Kicksecure for Qubes: Perform these steps inside Qubes
kicksecure-17Template.
Instead, use thewhonix-workstation-17 Template for these steps.
Whonix Version
[edit]
Each Whonix release is based on a particular version of Debian:
| Whonix version | Debian Version | Debian Codename |
|---|---|---|
Whonix17.4.4.6 | 12 | bookworm![]() |
Users can manually check the Whonix version at any time by followingthis step.
Security by Isolation
[edit]Whonix is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because Whonix protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.
Even when Tor provides sufficient anonymity, it can bevery complicated or impossible
for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors. Unfortunately, despite all best efforts leaks have occurred in the past due toTor Browser Bundle software defects (bugs). In such cases, Whonix users were protected and unaffected by these leaks.
In Whonix, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because Whonix's split-VM design ensures all internet traffic is routed through Tor.
Whonix is divided into two VMs:
- Whonix-Gateway to enforce routing of all Internet traffic through the Tor network, and
- Whonix-Workstation for work activities. Whonix-Workstation is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.
This security by isolation configuration averts many threats posed bymalware, misbehaving applications, and user error.
Figure:Whonix Operating System Design
(more technical illustrative images)
This is not an empty claim -- Whonix has been audited via thecorridor (Tor traffic whitelisting gateway) and otherleak tests. In over adecade, no leaks were ever discovered. Technical readers can refer to theWhonix technical introduction andsecurity overview chapters for further details.
Online Anonymity via Tor
[edit]
Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location.[6]
To learn more about Tor, seeWhy does Whonix use Tor and read the official documentation on theTor website
:
Summary
[edit]| Category | Description |
|---|---|
| Whonix is |
|
| Whonix helps to |
|
| Whonix is not |
|
Releases
[edit]Whonix Version
[edit]Each Whonix release is based on a particular version of Debian:
| Whonix version | Debian Version | Debian Codename | Supported |
|---|---|---|---|
Whonix17 | 12 | bookworm![]() | Yes |
Whonix18 | 13 | trixie![]() | In development. |
Users can manually check the Whonix version at any time by followingCheck Version.
Release Schedule
[edit]Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready.
Support Schedule
[edit]| Notice | Details |
|---|---|
| Platform specific |
|
| Deprecation Notices | We aim to announce deprecation events one month in advance to remind users to upgrade in thewhonix.org news forum![]() |
Next Steps
[edit]Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:
- TheWarning page to understand the security limitations of Whonix and Tor.
- Further information about WhonixFeatures.
- The impliedTrust placed in Whonix when it is used.
- Other relevantDocumentation explaining how to use Whonix safely.
See Also
[edit]Footnotes
[edit]- ↑Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network).If you can see both flows

, simple statistics based on data volume and timing can determine whether they match up.
- ↑https://www.torproject.org/about/overview.html.en

- ↑Debian Wikipedia

- ↑InQubes-Whonix, these VMs are named
sys-whonixandanon-whonix, respectively. - ↑VPNs do not even hide visited websites from your Internet Service Provider
- ↑Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network).If both flows are visible
simple statistics can determine whether they match up. - ↑Readers of theWhonix documentation will quickly learn that one-click anonymization solutions simplydo not exist and will likely never be developed.
- ↑Responsible for:
- Debian security issues -> Debian project
- Qubes security issues -> Qubes project
- Whonix security issues -> Whonix project
- ↑Why? Because it includes much newer software packages. That is what developers are using and where the development focus lies. Whonix is a small project and does not have a dedicated team for
oldstablesupport. Therefore,oldstablesupport is maintained as a side project.
License
[edit]Whonix About wiki page Copyright (C) Amnesia <amnesia at boum dot org>
Whonix About wiki page Copyright (C) 2012 - 2025 ENCRYPTED SUPPORT LLC <adrelanos(at)whonix.org(Replace(at)with@.)PleaseDO NOT use e-mail for one of the following reasons:Private Contact: Please avoid e-mail whenever possible. (Private Communications Policy)User Support Questions: No. (SeeSupport.)Leaks Submissions: No. (No Leaks Policy)Sponsored posts: No.Paid links: No.SEO reviews: No.Advertisement deals: No.Default application installation: No. (Default Application Policy)>This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it under certain conditions; see the wiki source code for details.
Gratitude is expressed toJonDos
forpermission
to use material from their website. The "Summary" chapter of the Whonix Design and Goals wiki page contains content from the JonDonym documentationFeatures
page.
2012- 2025 ENCRYPTED SUPPORT LLCWe believe security software like Whonix needs to remain open source and independent.Would you help sustain and grow the project? Learn more about our13 year success story and maybe DONATE!









